Detection of black hole attacks in vehicle-to-vehicle communications using ad hoc networks and on demand protocols

被引:0
|
作者
Bharanidharan, C. [1 ]
Malathi, S. [1 ]
Manoharan, Hariprasath [2 ]
机构
[1] Panimalar Engn Coll, Dept Artificial Intelligence & Data Sci, Chennai, India
[2] Ponjesly Coll Engn, Dept Elect & Commun Engn, Chennai, India
关键词
Vehicle ad hoc networks (VANETs); Mobile ad hoc networks (MANETs); Vehicles-to-vehicles (V-2-V); Vehicle-to-infrastructure (V2I); Ad hoc on demand vector (AODV); PERFORMANCE; PREVENTION; SECURITY; SYSTEMS; DMV;
D O I
10.1108/IJIUS-02-2023-0016
中图分类号
TP24 [机器人技术];
学科分类号
080202 ; 1405 ;
摘要
PurposeThe potential of vehicle ad hoc networks (VANETs) to improve driver and passenger safety and security has made them a hot topic in the field of intelligent transportation systems (ITSs). VANETs have different characteristics and system architectures from mobile ad hoc networks (MANETs), with a primary focus on vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication. But protecting VANETs from malicious assaults is crucial because they can undermine network security and safety.Design/methodology/approachThe black hole attack is a well-known danger to VANETs. It occurs when a hostile node introduces phony routing tables into the network, potentially damaging it and interfering with communication. A safe ad hoc on-demand distance vector (AODV) routing protocol has been created in response to this issue. By adding cryptographic features for source and target node verification to the route request (RREQ) and route reply (RREP) packets, this protocol improves upon the original AODV routing system.FindingsThrough the use of cryptographic-based encryption and decryption techniques, the suggested method fortifies the VANET connection. In addition, other network metrics are taken into account to assess the effectiveness of the secure AODV routing protocol under black hole attacks, including packet loss, end-to-end latency, packet delivery ratio (PDR) and routing request overhead. Results from simulations using an NS-2.33 simulator show how well the suggested fix works to enhance system performance and lessen the effects of black hole assaults on VANETs.Originality/valueAll things considered, the safe AODV routing protocol provides a strong method for improving security and dependability in VANET systems, protecting against malevolent attacks and guaranteeing smooth communication between cars and infrastructure.
引用
收藏
页码:245 / +
页数:118
相关论文
共 50 条
  • [1] Weighted Localization in Vehicular Ad Hoc Networks Using Vehicle-to-Vehicle Communication
    Altoaimy, Lina
    Mahgoub, Imad
    Rathod, Monika
    [J]. 2014 GLOBAL INFORMATION INFRASTRUCTURE AND NETWORKING SYMPOSIUM (GIIS), 2014,
  • [2] Performance Evaluation of Vehicle-to-Vehicle Communications for a Collective Perception Application in Vehicular Ad hoc Networks
    Sondi, Patrick
    Rivoirard, Lucas
    Wahl, Martine
    [J]. 2018 IEEE 29TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2018, : 602 - 603
  • [3] Vehicle-to-vehicle connectivity analysis for vehicular ad-hoc networks
    Yan, Gongjun
    Rawat, Danda B.
    [J]. AD HOC NETWORKS, 2017, 58 : 25 - 35
  • [4] Vehicle-to-Vehicle Connectivity and Communication Framework for Vehicular Ad-Hoc Networks
    Rawat, Danda B.
    Bista, Bhed B.
    Yan, Gongjun
    Olariu, Stephan
    [J]. 2014 EIGHTH INTERNATIONAL CONFERENCE ON COMPLEX, INTELLIGENT AND SOFTWARE INTENSIVE SYSTEMS (CISIS),, 2014, : 44 - 49
  • [5] Localizing Spoofing Attacks on Vehicular GPS Using Vehicle-to-Vehicle Communications
    Sanders, Christian
    Wang, Yongqiang
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (12) : 15656 - 15667
  • [6] Direct Vehicle-to-Vehicle Charging Strategy in Vehicular Ad-Hoc Networks
    Li, Guangyu
    Boukhatem, Lila
    Zhao, Lin
    Wu, Jinsong
    [J]. 2018 9TH IFIP INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2018,
  • [7] Neighborhood trustworthiness-based vehicle-to-vehicle authentication scheme for vehicular ad hoc networks
    Wang, Chen
    Xiao, Lu
    Shen, Jian
    Huang, Rui
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (21):
  • [8] Relative velocity based vehicle-to-vehicle routing protocol over Ad-Hoc networks
    Lee, Won-Il
    Pyun, Jae-Young
    Lee, Yang Sun
    Lee, Sang-Woong
    [J]. INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2013, 12 (01) : 14 - 22
  • [9] Cluster-based multi-channel communications protocols in vehicle ad hoc networks
    Zhang, Xi
    Su, Hang
    Chen, Hsiao-Hwa
    [J]. IEEE WIRELESS COMMUNICATIONS, 2006, 13 (05) : 44 - 51
  • [10] Solution of detecting jamming attacks in vehicle ad hoc networks
    Nguyen, Anh Tuan
    Mokdad, Lynda
    Ben-Othman, Jalel
    [J]. MSWiM 2013 - Proceedings of the 16th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, 2013, : 405 - 410